Skip to main content

Advertisement

Log in

CDS-Fuzzy Opportunistic Routing Protocol for Wireless Sensor Networks

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Compilation of nodes to form a virtual backbone is a key feature for efficient routing in wireless sensor networks. Dominating-set-based routing is found to simplify the node selection process in the routing. In this paper we propose a two phase routing protocol, one for the construction of k-connected dominating set with nodes in the set acting as cluster heads. Selection of cluster head provides fault tolerance and energy efficiency. The second phase achieves energy optimization and prolongs network lifetime through multi-parameter fuzzy opportunistic routing decision taken by each cluster head to select an optimal path. Parameters such as queue size, closeness of node to sink and residual energy are input into fuzzy logic system. Simulation results show that the proposed k-connected CDS-based fuzzy routing extends the network lifetime provide 90 % tolerance failure ratio and achieves energy efficiency.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17

Similar content being viewed by others

References

  1. Harold Robinson, Y., & Rajaram, M. (2014). A novel approach to allocate channels dynamically in wireless mesh networks. World Academy of Science, Engineering and Technology, International Journal of Computer, Electrical, Automation, Control and Information Engineering, 8(10), 1865–1868.

    Google Scholar 

  2. Shorey, R., Ananda, A., & Ooi, W. T. (2006). Mobile wireless and sensor networks (1st ed.). IEEE press, Wiley.

  3. Fang, Q., Gao, J., & Guibas, L. (2006). Locating and bypassing holes in sensor networks. Mobile Networks and Applications, 11(2), 187–200.

    Article  Google Scholar 

  4. Romer, K., Kastin, O., & Mattern, F. (2002). Middleware challenges for wireless sensor networks. ACM SIGMOBILE Mobile Computing and Communications Review, 6(4), 59–61.

    Article  Google Scholar 

  5. Ramalakshmi, S., & Robinson, Y. H. (2014). ATMPH: Attaining optimal throughput capacity of MANET with power control in heterogeneous network. Programmable Device Circuits and Systems, 6(4), 111–115.

    Google Scholar 

  6. Golden Julie, E., & Tamil Selvi, S. (2016). Development of energy efficient clustering protocol in wireless sensor network using neuro-fuzzy approach. The Scientific World Journal, 2016, 1–8.

    Article  Google Scholar 

  7. Fan, C.-S. (2013). Rich: Region-based intelligent cluster-head selection and node deployment strategy in concentric-based WSNs. Advances in Electrical and Computer Engineering, 13(4), 3–8. doi:10.4316/AECE.2013.04001.

    Article  Google Scholar 

  8. Jorgic, M., Stojmenovic, I., Hauspie, M., & Simplot-Ry, D. (2004). Localized algorithms for detection of critical nodes and links for connectivity in ad hoc networks. In Proceedings of 3rd IFIP mediterranean ad hoc networking workshop.

  9. Dai, F., & Wu, J. (2006). On constructing k-connected k-dominating set in wireless adhoc and sensor networks. Journal of Parallel and Distributed Computing 19th International Parallel and Distributed Processing Symposium, 66(7), 947–958.

    MATH  Google Scholar 

  10. Haider, T., & Yusuf, M. (2009). A fuzzy approach to energy optimized routing for wireless sensor networks. The International Arab Journal of Information Technology, 6(2), 179–185.

    Google Scholar 

  11. ALMomani, I. M., & Saadeh, M. K. (2011). FEAR: Fuzzy-based energy aware routing protocol for wireless sensor networks. International Journal of Communication Networks and System Sciences, 4, 403–415.

    Article  Google Scholar 

  12. Harold Robinson, Y., & Rajaram, M. (2016). A memory aided broadcast mechanism with fuzzy classification on a device-to-device mobile Ad Hoc network. Wireless Personal Communications, 1–23. doi:10.1007/s11277-016-3213-0.

  13. AbdulAlim, Md Abdul, Wu, Yu Cheng, & Wang, Wei. (2013). A fuzzy based clustering protocol for energy-efficient wireless sensor networks. Advanced Materials Research, Scientific. Net, 760, 685–690.

    Article  Google Scholar 

  14. Jiang, H., Sun, Y., Sun, R., & Xu, H. (2013). Fuzzy-logic-based energy optimized routing for wireless sensor networks. International Journal of Distributed Sensor Networks, 2013. Hindawi Publishing Corporation.

  15. Kui, X., Sheng, Y., Du, H., & Liang, J. (2013). Constructing a CDS-based network backbone for data collection in wireless sensor networks. International Journal of Distributed Sensor Networks, Hindawi Publishing Corporation.

  16. Hussain, S., Shafique, M. I., & Yang, L. T. (2010). Constructing a CDS based network backbone for energy efficiency in industrial wireless sensor network. In Proceedings of the 12th IEEE International Conference on High Performance Computing and Communications (HPCC’10) (pp. 322–328). Melbourne.

  17. Harold Robinson, Y., & Rajaram, M. (2015). Energy-aware multipath routing scheme based on particle swarm optimization in mobile ad hoc networks. The Scientific World Journal, 1–9. doi:10.1155/2015/284276.

  18. Kui, X. Y., Zhang, S. G., Wang, J. X., & Cao, J. N. (2012). An energy balanced clustering protocol based on dominating set for data gathering in wireless sensor networks. In Proceedings of the 2012 IEEE international conference on communications (ICC’12) (pp. 193–197). Ottawa.

  19. Zeng, Y., Jia, X., & He, Y. (2006). Energy efficient distributed connected dominating sets construction in wireless sensor networks. In Proceedings of the international wireless communications and mobile computing conference (IWCMC’06) (pp.797–802).

  20. Harold Robinson, Y., & Rajaram, M. (2015). Establishing pairwise keys using key predistribution schemes for sensor networks. World Academy of Science, Engineering and Technology International Journal of Computer, Electrical, Automation, Control and Information Engineering, 9(2), 608–612.

    Google Scholar 

  21. Dai, F., & Wu, J. (2005) On constructing k-connected k-dominating set in wireless networks. In Proceedings of the 19th IEEE international parallel and distributed processing symposium (IPDPS’05). Denver.

  22. Wang, F., Thai, M. T., & Du, D. Z. (2009). On the construction of 2-connected virtual backbone in wireless networks. IEEE Transactions on Wireless Communications, 8(3), 1230–1237.

    Article  Google Scholar 

  23. Wu, Y., Wang, F., Thai, M. T., & Li, Y. (2007). Constructing k-connected m-dominating sets in wireless sensor networks. In Proceedings of the military communications conference (MILCOM’07) (pp. 1–7).

  24. Blum, J., Ding, M., Thaeler, A., & Cheng, X. (2005). Connected dominating set in sensor networks and MANETs. In Handbook of combinatorial optimization (Vol. 8, pp. 329–369). Springer.

  25. Harold Robinson, Y., & Rajaram, M. (2015). Trustworthy link failure recovery algorithm for highly dynamic mobile adhoc networks. World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering, 9(2), 233–236.

    Google Scholar 

  26. Golden Julie, E., Tamil Selvi, S., & Harold Robinson, Y. (2014). Opportunistic routing with secure coded wireless multicast using MAS approach. World Academy of Science, Engineering and Technology, International Journal of Computer, Electrical, Automation, Control and Information Engineering, 8(7), 1247–1250.

    Google Scholar 

  27. Goldreich, O., & Ron, D. (1997) Property testing in bounded degree graphs. In Proceedings of 29th annual symposium on theory of computing (pp. 416–420).

  28. Wu, Y., & Li, Y. (2008) Construction algorithms for k-connected m-dominating sets in wireless sensor networks. In Proceedings of 9th ACM international annual symposium on theory of computing (pp. 83–90).

  29. Robinson, Y. H., & Rajeswari, S. R. (2011). Energy-based dynamic encryption for wireless sensor networks. Wireless Communication, 3(9), 661–663.

    Google Scholar 

  30. Dietrich, I., & Dressler, F. (2009). On the lifetime of wireless sensor networks. ACM Transactions on Sensor Networks, 5(1) (Article 5).

  31. Karadge, P. S., & Sankpal, S. V. (2013). A performance comparison of energy efficient AODV protocols in mobile adhoc networks. International Journal of Advanced Research in Computer and Communication Engineering, 2(1).

  32. Al-Nabhan, N., Al-Rodhaan, M., & Al-Dhelaan, A. (2014) Distributed energy-efficient approaches for connected dominating set construction in wireless sensor networks. International Journal of Distributed Sensor Networks, 2014. Hindawi Publishing Corporation.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to E. Golden Julie.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Golden Julie, E., Tamilselvi, S. CDS-Fuzzy Opportunistic Routing Protocol for Wireless Sensor Networks. Wireless Pers Commun 90, 903–922 (2016). https://doi.org/10.1007/s11277-016-3250-8

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-016-3250-8

Keywords

Navigation